Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html

Overview

General Information

Sample Name:Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html
Analysis ID:756210
MD5:d21ad4851c96168de4456dea77044b9c
SHA1:bee29bccd77e6848093f899a493f1330442899da
SHA256:989f90793f02c5b623cf3830d184dba364fef0d2c2726d4636fb3b4877cafa39
Infos:

Detection

HTMLPhisher
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish45
JA3 SSL client fingerprint seen in connection with other malware
Yara signature match
IP address seen in connection with other malware

Classification

  • System is w10x64_ra
  • chrome.exe (PID: 6832 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
    • chrome.exe (PID: 7036 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1748,i,3206524124022006366,8441393421957404145,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.htmlSUSP_obfuscated_JS_obfuscatorioDetects JS obfuscation done by the js obfuscator (often malicious)@imp0rtp3
  • 0x5d0e:$c8: while(!![])
  • 0x5d2c:$d1: parseInt(_0x111cb9(0x7c))/0x1*(parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(
  • 0x5d4b:$d1: parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-
  • 0x5d6b:$d1: parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(
  • 0x5d8b:$d1: parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+
  • 0x5dab:$d1: parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+parseInt(_0x111cb9(0x8d))/0xa+
SourceRuleDescriptionAuthorStrings
49412.0.pages.csvSUSP_obfuscated_JS_obfuscatorioDetects JS obfuscation done by the js obfuscator (often malicious)@imp0rtp3
  • 0x7807:$c8: while(!![])
  • 0x7825:$d1: parseInt(_0x111cb9(0x7c))/0x1*(parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(
  • 0x7844:$d1: parseInt(_0x111cb9(0x75))/0x2)+-parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-
  • 0x7864:$d1: parseInt(_0x111cb9(0x80))/0x3*(-parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(
  • 0x7884:$d1: parseInt(_0x111cb9(0x7b))/0x4)+-parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+
  • 0x78a4:$d1: parseInt(_0x111cb9(0x6e))/0x5+-parseInt(_0x111cb9(0x83))/0x6*(parseInt(_0x111cb9(0x86))/0x7)+-parseInt(_0x111cb9(0x6f))/0x8*(parseInt(_0x111cb9(0x81))/0x9)+parseInt(_0x111cb9(0x8d))/0xa+
49412.0.pages.csvJoeSecurity_HtmlPhish_45Yara detected HtmlPhish_45Joe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    Phishing

    barindex
    Source: Yara matchFile source: 49412.0.pages.csv, type: HTML
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
    Source: unknownHTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.3:49718 version: TLS 1.2
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: Joe Sandbox ViewIP Address: 104.17.24.14 104.17.24.14
    Source: Joe Sandbox ViewIP Address: 152.199.23.72 152.199.23.72
    Source: Joe Sandbox ViewIP Address: 152.199.23.72 152.199.23.72
    Source: unknownDNS traffic detected: queries for: code.jquery.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49693 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
    Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
    Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficHTTP traffic detected: GET /service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.102&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1 HTTP/1.1Host: clients2.google.comConnection: keep-aliveX-Goog-Update-Interactivity: fgX-Goog-Update-AppId: nmmhkkegccagdldgiimedpiccmgmiedaX-Goog-Update-Updater: chromecrx-104.0.5112.102Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /ajax/libs/font-awesome/4.7.0/css/font-awesome.css HTTP/1.1Host: cdnjs.cloudflare.comConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"Origin: nullsec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: text/css,*/*;q=0.1Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: styleAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /shared/1.0/content/images/picker_verify_call_fe87496cc7a44412f7893a72099c120a.svg HTTP/1.1Host: aadcdn.msauth.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /shared/1.0/content/images/picker_verify_sms_27a6d18b56f46818420e60a773c36d4e.svg HTTP/1.1Host: aadcdn.msauth.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /shared/1.0/content/images/picker_verify_fluent_authenticator_b59c16ca9bf156438a8a96d45e33db64.svg HTTP/1.1Host: aadcdn.msauth.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772 HTTP/1.1Host: aadcdn.msauthimages.netConnection: keep-alivesec-ch-ua: "Chromium";v="104", " Not A;Brand";v="99", "Google Chrome";v="104"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
    Source: global trafficHTTP traffic detected: GET /dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36Host: aadcdn.msauthimages.net
    Source: global trafficHTTP traffic detected: GET /dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.183 Safari/537.36Host: aadcdn.msauthimages.netIf-Modified-Since: Tue, 31 Oct 2017 18:11:00 GMTIf-None-Match: 0x8D5208ABDB3B476
    Source: unknownHTTP traffic detected: POST /ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard HTTP/1.1Host: accounts.google.comConnection: keep-aliveContent-Length: 1Origin: https://www.google.comContent-Type: application/x-www-form-urlencodedSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: CONSENT=PENDING+620; __Secure-ENID=6.SE=cJKCBuSaL1dV3R8z2Y2al7-m2m5bGA74lqbYYkqC3uy-NtZ1f6n_bCBr25tlnnjvdmLpGQ81ZKzP3Te5vVjpSQjYWCwvlOMApK7tmZNWcORu0p4wniPJGQfTslQNnpQWhG9qkwkEgy49-6UG3UQ1eiUyFolJZWLeUM1p4KvjM9E
    Source: unknownHTTPS traffic detected: 152.199.23.72:443 -> 192.168.2.3:49718 version: TLS 1.2
    Source: Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html, type: SAMPLEMatched rule: SUSP_obfuscated_JS_obfuscatorio date = 2021-08-25, author = @imp0rtp3, description = Detects JS obfuscation done by the js obfuscator (often malicious), score = , reference = https://obfuscator.io
    Source: 49412.0.pages.csv, type: HTMLMatched rule: SUSP_obfuscated_JS_obfuscatorio date = 2021-08-25, author = @imp0rtp3, description = Detects JS obfuscation done by the js obfuscator (often malicious), score = , reference = https://obfuscator.io
    Source: classification engineClassification label: mal48.phis.winHTML@23/0@12/11
    Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1748,i,3206524124022006366,8441393421957404145,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1748,i,3206524124022006366,8441393421957404145,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Program Files\Google\GoogleUpdaterJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Google\Chrome\Application\chrome.exeDirectory created: C:\Program Files\Google\GoogleUpdaterJump to behavior
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath Interception1
    Process Injection
    2
    Masquerading
    OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemExfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Process Injection
    LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
    Non-Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
    Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer1
    Ingress Tool Transfer
    SIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    part-0017.t-0009.t-msedge.net0%VirustotalBrowse
    part-0017.t-0009.fbs1-t-msedge.net0%VirustotalBrowse
    cs1025.wpc.upsiloncdn.net0%VirustotalBrowse
    aadcdn.msauthimages.net0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://aadcdn.msauthimages.net/dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=6364507025969127720%Avira URL Cloudsafe
    https://dreams15.co/csc/host9/0f70e1a.php0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    part-0017.t-0009.t-msedge.net
    13.107.246.45
    truefalseunknown
    accounts.google.com
    142.250.186.45
    truefalse
      high
      cdnjs.cloudflare.com
      104.17.24.14
      truefalse
        high
        part-0017.t-0009.fbs1-t-msedge.net
        13.107.219.45
        truefalseunknown
        www.google.com
        142.250.181.228
        truefalse
          high
          clients.l.google.com
          142.250.186.110
          truefalse
            high
            cs1025.wpc.upsiloncdn.net
            152.199.23.72
            truefalseunknown
            dreams15.co
            192.185.196.50
            truefalse
              unknown
              aadcdn.msauthimages.net
              unknown
              unknownfalseunknown
              clients2.google.com
              unknown
              unknownfalse
                high
                code.jquery.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  file:///C:/Users/user/Desktop/Markelcorp%20Pay-Application%20Completed%20November%2029,%202022_48707712230774110046.htmlfalse
                    low
                    https://dreams15.co/csc/host9/0f70e1a.phpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.cssfalse
                      high
                      https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.102&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1false
                        high
                        https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standardfalse
                          high
                          https://aadcdn.msauthimages.net/dbd5a2dd-ttl-x9zsondwno6uogaxggczkbj5okcite29gtm-6do/logintenantbranding/0/bannerlogo?ts=636450702596912772false
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          142.250.186.45
                          accounts.google.comUnited States
                          15169GOOGLEUSfalse
                          104.17.24.14
                          cdnjs.cloudflare.comUnited States
                          13335CLOUDFLARENETUSfalse
                          152.199.23.72
                          cs1025.wpc.upsiloncdn.netUnited States
                          15133EDGECASTUSfalse
                          13.107.246.45
                          part-0017.t-0009.t-msedge.netUnited States
                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          239.255.255.250
                          unknownReserved
                          unknownunknownfalse
                          142.250.181.228
                          www.google.comUnited States
                          15169GOOGLEUSfalse
                          192.185.196.50
                          dreams15.coUnited States
                          46606UNIFIEDLAYER-AS-1USfalse
                          142.250.186.110
                          clients.l.google.comUnited States
                          15169GOOGLEUSfalse
                          IP
                          192.168.2.2
                          192.168.2.1
                          127.0.0.1
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:756210
                          Start date and time:2022-11-29 20:23:50 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 3m 58s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html
                          Cookbook file name:defaultwindowsinteractivecookbook.jbs
                          Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                          Number of analysed new started processes analysed:11
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal48.phis.winHTML@23/0@12/11
                          EGA Information:Failed
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .html
                          • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, usocoreworker.exe, svchost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded IPs from analysis (whitelisted): 69.16.175.42, 69.16.175.10, 142.250.185.67, 34.104.35.123, 142.250.185.227
                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, cds.s5x3j6q5.hwcdn.net, fs.microsoft.com, slscr.update.microsoft.com, aadcdnoriginwus2.azureedge.net, ctldl.windowsupdate.com, clientservices.googleapis.com, aadcdn.msauth.net, firstparty-azurefd-prod.trafficmanager.net, edgedl.me.gvt1.com, login.live.com, aadcdn.azureedge.net, aadcdn.ec.azureedge.net, update.googleapis.com, aadcdnoriginwus2.afd.azureedge.net, global-entry-afdthirdparty-fallback.trafficmanager.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtWriteVirtualMemory calls found.
                          No simulations
                          No context
                          No context
                          No context
                          No context
                          No context
                          No created / dropped files found
                          File type:HTML document, ASCII text, with very long lines (27424), with no line terminators
                          Entropy (8bit):5.901905953457114
                          TrID:
                            File name:Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html
                            File size:27424
                            MD5:d21ad4851c96168de4456dea77044b9c
                            SHA1:bee29bccd77e6848093f899a493f1330442899da
                            SHA256:989f90793f02c5b623cf3830d184dba364fef0d2c2726d4636fb3b4877cafa39
                            SHA512:3a6bf8462a335e0a83ed20aa7840f4c4b891afd95299b08f55b8e878927ad2dce5fb94a6dff0904e0fbcbf70a05ee87c338ffc43e4e062577753617ce5a6a882
                            SSDEEP:768:72zsDrtJtatBLtrevto8W+3YNYziUr9Dng6PsyTljhdqk/rmWLT/AhlDfy:724DrtJtatxtrevto8W+7iUJg6PsUrw6
                            TLSH:87C23D130A077A775F113B7B0B5B3E0F2405BD9D2AE16984D7168E64E11EB0B09EA23D
                            File Content Preview:<head> </head><body> <div id="loadingScreen" style=""><input class="UOvCe9ucmB4k" type="hidden" id="b64u" value="aHR0cHM6Ly9kcmVhbXMxNS5jby9jc2MvaG9zdDkvMGY3MGUxYS5waHA="></input><div style="display:none;" id="e5zezr5TRTXB" name="V2Y8WIS38Z3i" class="5tAa
                            Icon Hash:78d0a8cccc88c460
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 29, 2022 20:24:19.603596926 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:19.603663921 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:19.603761911 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:19.606369972 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:19.606403112 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:19.618220091 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:19.618302107 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:19.618407965 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:19.618762016 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:19.618792057 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:19.714555025 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:19.715059042 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:19.715111971 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:19.716875076 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:19.716993093 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:19.721939087 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:19.744334936 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:19.744398117 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:19.745439053 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:19.745567083 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:19.746886969 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:19.746975899 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:20.022597075 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:20.022658110 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.022981882 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.024271011 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:20.024315119 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.025073051 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:20.025147915 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.025357008 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:20.025378942 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.025429010 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.053329945 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.053431988 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:20.053474903 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.053576946 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.053663969 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:20.057389021 CET49693443192.168.2.3142.250.186.110
                            Nov 29, 2022 20:24:20.057430983 CET44349693142.250.186.110192.168.2.3
                            Nov 29, 2022 20:24:20.065962076 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:20.066020966 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.080029011 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.080111027 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:20.080159903 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.080389023 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.080462933 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:20.082889080 CET49696443192.168.2.3142.250.186.45
                            Nov 29, 2022 20:24:20.082932949 CET44349696142.250.186.45192.168.2.3
                            Nov 29, 2022 20:24:20.506098032 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.506182909 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.506308079 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.506639004 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.506669044 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.778419018 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.788678885 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.788736105 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.790395975 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.790596962 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.792845011 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.792865992 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.793039083 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.793091059 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.793104887 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.833014011 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:20.833054066 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:20.873086929 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.432343006 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.432408094 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.432425022 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.432492971 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.432519913 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.432521105 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.432570934 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.432627916 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.473212004 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.555254936 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555283070 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555424929 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555480003 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555529118 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555538893 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.555540085 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.555547953 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555573940 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555591106 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.555634022 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555679083 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.555704117 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.555785894 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.555807114 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.595247984 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.679264069 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.679289103 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.679389000 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.679449081 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.679471970 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.679867029 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.679972887 CET49698443192.168.2.3192.185.196.50
                            Nov 29, 2022 20:24:22.679990053 CET44349698192.185.196.50192.168.2.3
                            Nov 29, 2022 20:24:22.680197954 CET44349698192.185.196.50192.168.2.3
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 29, 2022 20:24:19.556044102 CET6518653192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:19.557481050 CET5004153192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:19.558235884 CET6376553192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:19.575220108 CET53500411.1.1.1192.168.2.3
                            Nov 29, 2022 20:24:19.578953028 CET53637651.1.1.1192.168.2.3
                            Nov 29, 2022 20:24:20.271323919 CET4945453192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:20.501948118 CET53494541.1.1.1192.168.2.3
                            Nov 29, 2022 20:24:23.285932064 CET6457953192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:23.304537058 CET53645791.1.1.1192.168.2.3
                            Nov 29, 2022 20:24:23.311235905 CET5234853192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:23.330245972 CET53523481.1.1.1192.168.2.3
                            Nov 29, 2022 20:24:23.522164106 CET5290753192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:23.539839029 CET53529071.1.1.1192.168.2.3
                            Nov 29, 2022 20:24:24.897500038 CET5624453192.168.2.31.1.1.1
                            Nov 29, 2022 20:24:27.267615080 CET5894653192.168.2.31.1.1.1
                            Nov 29, 2022 20:25:23.342816114 CET5522053192.168.2.31.1.1.1
                            Nov 29, 2022 20:25:23.360928059 CET53552201.1.1.1192.168.2.3
                            Nov 29, 2022 20:25:23.367889881 CET5797553192.168.2.31.1.1.1
                            Nov 29, 2022 20:25:23.386446953 CET53579751.1.1.1192.168.2.3
                            Nov 29, 2022 20:25:29.444670916 CET4976753192.168.2.31.1.1.1
                            Nov 29, 2022 20:25:29.674268007 CET53497671.1.1.1192.168.2.3
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Nov 29, 2022 20:24:19.556044102 CET192.168.2.31.1.1.10x5469Standard query (0)code.jquery.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:19.557481050 CET192.168.2.31.1.1.10xc108Standard query (0)accounts.google.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:19.558235884 CET192.168.2.31.1.1.10x8e35Standard query (0)clients2.google.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:20.271323919 CET192.168.2.31.1.1.10x51c8Standard query (0)dreams15.coA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.285932064 CET192.168.2.31.1.1.10x4b23Standard query (0)www.google.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.311235905 CET192.168.2.31.1.1.10xaa0dStandard query (0)www.google.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.522164106 CET192.168.2.31.1.1.10xb7d1Standard query (0)cdnjs.cloudflare.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:24.897500038 CET192.168.2.31.1.1.10x63dStandard query (0)aadcdn.msauthimages.netA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:27.267615080 CET192.168.2.31.1.1.10x9293Standard query (0)aadcdn.msauthimages.netA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:25:23.342816114 CET192.168.2.31.1.1.10x6b47Standard query (0)www.google.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:25:23.367889881 CET192.168.2.31.1.1.10xa4dbStandard query (0)www.google.comA (IP address)IN (0x0001)false
                            Nov 29, 2022 20:25:29.444670916 CET192.168.2.31.1.1.10xda0bStandard query (0)dreams15.coA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Nov 29, 2022 20:24:19.575120926 CET1.1.1.1192.168.2.30x5469No error (0)code.jquery.comcds.s5x3j6q5.hwcdn.netCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:19.575220108 CET1.1.1.1192.168.2.30xc108No error (0)accounts.google.com142.250.186.45A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:19.578953028 CET1.1.1.1192.168.2.30x8e35No error (0)clients2.google.comclients.l.google.comCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:19.578953028 CET1.1.1.1192.168.2.30x8e35No error (0)clients.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:20.501948118 CET1.1.1.1192.168.2.30x51c8No error (0)dreams15.co192.185.196.50A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.304537058 CET1.1.1.1192.168.2.30x4b23No error (0)www.google.com142.250.181.228A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.330245972 CET1.1.1.1192.168.2.30xaa0dNo error (0)www.google.com142.250.181.228A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.539839029 CET1.1.1.1192.168.2.30xb7d1No error (0)cdnjs.cloudflare.com104.17.24.14A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.539839029 CET1.1.1.1192.168.2.30xb7d1No error (0)cdnjs.cloudflare.com104.17.25.14A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.601629972 CET1.1.1.1192.168.2.30xc441No error (0)dual.part-0017.t-0009.t-msedge.netpart-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:23.601629972 CET1.1.1.1192.168.2.30xc441No error (0)part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:23.601629972 CET1.1.1.1192.168.2.30xc441No error (0)part-0017.t-0009.t-msedge.net13.107.213.45A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:24.917996883 CET1.1.1.1192.168.2.30x63dNo error (0)aadcdn.msauthimages.netaadcdn.azureedge.netCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:24.917996883 CET1.1.1.1192.168.2.30x63dNo error (0)cs1025.wpc.upsiloncdn.net152.199.23.72A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:27.290196896 CET1.1.1.1192.168.2.30x9293No error (0)aadcdn.msauthimages.netaadcdn.azureedge.netCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:27.290196896 CET1.1.1.1192.168.2.30x9293No error (0)cs1025.wpc.upsiloncdn.net152.199.23.72A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:27.380778074 CET1.1.1.1192.168.2.30xb0ccNo error (0)dual.part-0017.t-0009.t-msedge.netglobal-entry-afdthirdparty-fallback.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:27.380778074 CET1.1.1.1192.168.2.30xb0ccNo error (0)dual.part-0017.t-0009.fbs1-t-msedge.netpart-0017.t-0009.fbs1-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                            Nov 29, 2022 20:24:27.380778074 CET1.1.1.1192.168.2.30xb0ccNo error (0)part-0017.t-0009.fbs1-t-msedge.net13.107.219.45A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:24:27.380778074 CET1.1.1.1192.168.2.30xb0ccNo error (0)part-0017.t-0009.fbs1-t-msedge.net13.107.227.45A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:25:23.360928059 CET1.1.1.1192.168.2.30x6b47No error (0)www.google.com142.250.185.100A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:25:23.386446953 CET1.1.1.1192.168.2.30xa4dbNo error (0)www.google.com142.250.181.228A (IP address)IN (0x0001)false
                            Nov 29, 2022 20:25:29.674268007 CET1.1.1.1192.168.2.30xda0bNo error (0)dreams15.co192.185.196.50A (IP address)IN (0x0001)false
                            • clients2.google.com
                            • accounts.google.com
                            • dreams15.co
                            • cdnjs.cloudflare.com
                            • aadcdn.msauth.net
                            • aadcdn.msauthimages.net

                            Click to jump to process

                            Target ID:0
                            Start time:20:24:15
                            Start date:29/11/2022
                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument C:\Users\user\Desktop\Markelcorp Pay-Application Completed November 29, 2022_48707712230774110046.html
                            Imagebase:0x7ff6566b0000
                            File size:2852640 bytes
                            MD5 hash:7BC7B4AEDC055BB02BCB52710132E9E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            Target ID:2
                            Start time:20:24:17
                            Start date:29/11/2022
                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1748,i,3206524124022006366,8441393421957404145,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
                            Imagebase:0x7ff6566b0000
                            File size:2852640 bytes
                            MD5 hash:7BC7B4AEDC055BB02BCB52710132E9E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate

                            No disassembly